• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/33

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

33 Cards in this Set

  • Front
  • Back

adware

Adware is a type of free software supported by advertisements that show up in pop-up windows or on a toolbar on your computer or browser

back up

In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. The verb form is to back up in two words, whereas the noun is backup.

blog

A blog (a truncation of the expression weblog)[1] is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries ("posts").

browser

A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web.

computer crime

Crimes that use computer networks or devices to advance other ends include: Fraud and identity theft (although this increasingly uses malware, hacking and/or phishing, making it an example of both "computer as target" and "computer as tool" crime) Information warfare. Phishing scams.

computer ethics

computer ethics is a part of practical philosophy which concerns with how computing professionals should make decisions regarding professional and social conduct.

computer virus

an infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by light microscopy, and is able to multiply only within the living cells of a host.

copyright

Copyright is a legal right created by the law of a country that grants the creator of an original work exclusive rights for its use and distribution.

cyber bullying

Cyberbullying is the use of technology to harass, threaten, embarrass or target another person

cyber crime

crime conducted via the Internet or some other computer network

discussion board

A discussion board (known also by various other names such as discussion group, discussion forum, message board, and online forum) is a general term for any online "bulletin board" where you can leave and expect to see responses to messages you have left.

download

copy (data) from one computer system to another, typically over the Internet

electronic mail

E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text.

encryption

Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.

Ethics

moral principles that govern a person's or group's behavior.

firewall

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

hacker

a person who uses computers to gain unauthorized access to data.

identity theft

the deliberate use of someone else's identity

internet

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide. It is a network of

local area network

a computer network that links devices within a building or group of adjacent building

password

a secret word or phrase that must be used to gain admission to something.a string of characters that allows access to a computer, interface, or system

social networking

the use of dedicated websites and applications to interact with other users, or to find people with similar interests to onesel

software piracy

Software piracy is the illegal copying, distribution, or use of software. It is such a profitable "business" that it has caught the attention of organized crime groups in a number of countries. According to the Business Software Alliance (BSA), about 36% of all software in current use is stolen.

spam

Spamming, unsolicited or undesired electronic messages

spoofing

imitate (something) while exaggerating its characteristic features for comic effect.

spyware

software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

trojan horses

a program designed to breach the security of a computer system while ostensibly performing some innocuous function.

unauthorized computer access

enacted by Congress in 1986 as an amendment to existing computer fraud law

URL

URL is an acronym for Uniform Resource Locator and is a reference (an address) to a resource on the Internet. A URL has two main components:

wide area network

a computer network in which the computers connected may be far apart, generally having a radius of half a mile or more.

wiki

a free online encyclopedia, created and edited by volunteers around

world wide web


worms

fv